Registros relacionados: Theory of Cryptography :
- Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : Proceedings /
- Cryptography and Security Systems : Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : Proceedings /
- Cryptographic Hardware and Embedded Systems, CHES 2014 : 16th International Workshop, Busan, South Korea, September 23-26, 2014 : Proceedings /
- Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014 : Proceedings /
- Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014 : Proceedings /
- Detection of Intrusions and Malware, and Vulnerability Assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014 : Proceedings /
Assunto: Control de Acceso (Ingeniería Computacional)
- Diseño e implementación de un sistema de control para acceso de personal /
- Information Security : An Integrated Collection of Essays /
- Socio-Technical and Human Congition Elements of Information Systems /
- International IT Governance : An Executive Guide to ISO 17799 / ISO 27001 /
- Universidade H4ck3r : desvende todos os segredos do submundo dos hackers /
- Firewall : la seguridad de la banda ancha /
Assunto: Sistemas de Detección de Intrusos (Ingeniería Computacional)
- Hacking y seguridad en Internet /
- Seguridad de redes locales /
- Computer Security : Art and Science /
- Advanced Penetration Testing for Highly-Secured Environments : The Ultimate Security Guide : Learn to Perform Professional Penetration Testing for Highly-Secured Environments with This Intensive Hands-on Guide /
- Prevención y detección de delitos informáticos /
- Introduction to Computer Security /